9
Computer operating programs, recorded; computer programs, downloadable; computer programs, recorded; computer software applications, downloadable; computer software platforms, recorded or downloadable; computer software, recorded; software; electronic publications, downloadable; interfaces for computers; monitors [computer programs]; biometric access control systems; computer software for accessing databases; access control cards [encoded or magnetic]; cards encoded to access computer software; RAM [random access memory] card; SIM cards
38
Providing access to databases; providing access to telecommunication networks; providing access to computer networks; rental of access time to global computer networks; communications by computer terminals; computer aided transmission of messages and images; providing information in the field of telecommunications; providing telecommunications connections to a global computer network; providing user access to global computer networks; telecommunications access services; data communication services accessible by access code; remote data access services; computer communication and Internet access; providing users with secure remote access via the internet to private computer networks
42
Cloud computing; computer programming; computer security consultancy; computer software consultancy; computer software design; computer system analysis; computer system design; computer technology consultancy; rental of computer software; data encryption services; data security consultancy; development of computer platforms; duplication of computer programs; electronic data storage; electronic monitoring of personally identifying information to detect identity theft via the internet; hosting computer sites [web sites]; information technology [IT] consultancy; information technology services provided on an outsourcing basis; installation of computer software; internet security consultancy; maintenance of computer software; monitoring of computer systems by remote access; monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems to detect breakdowns; off-site data backup; platform as a service [PaaS]; recovery of computer data; server hosting; hosting computer software applications for others; software as a service [SaaS]; software development in the framework of software publishing; technological consultancy; technological research; updating of computer software; user authentication services using single sign-on technology for online software applications; user authentication services using technology for e-commerce transactions; computer software integration; access Control as a Service (ACaaS); hosting of Access Control as a Service (ACaaS) servers and software; authentication services (control) of data transmitted via telecommunications; authentication services; authentication services (control) of messages transmitted via telecommunications